Overview
List members of specific collections to understand deployment targets and organizational groupings. This command reveals which devices or users belong to collections, providing insight into administrative structure and deployment patterns.Syntax
Parameters
The IP address, FQDN, or NetBIOS name of the SMS Provider to connect to
The three-character site code (e.g., “PS1”)
Filter by collection name (supports partial matching)
Filter by specific collection ID (e.g., “SMS00001”)
Find collections containing specific device
Specify properties to retrieve (can be used multiple times)
Custom WQL WHERE clause for advanced filtering
Return count of results only
Display all member properties
Examples
Key Properties
| Property | Description | Use Case |
|---|---|---|
Name | Member name | Primary identifier |
ResourceID | Unique identifier | Cross-referencing |
IsClient | SCCM client status | Management verification |
Domain | Active Directory domain | Domain analysis |
CollectionID | Parent collection | Collection mapping |
IsActive | Member activity status | Active member filtering |
ResourceType | Resource type | Device vs user distinction |
Required Permissions
SMS Admins local group membership on the SMS Provider server
Collection Intelligence
Membership Analysis
Membership Analysis
Device Collections:
- Workstations, servers, and specialized systems
- Administrative and infrastructure systems
- Department or location-based groupings
- Administrative users and service accounts
- Department or role-based groupings
- Application access groups
Organizational Structure
Organizational Structure
Administrative Boundaries:
- High-privilege collections (admin workstations, servers)
- Department-specific collections
- Geographic or site-based collections
- Application deployment targets
- Security update deployment groups
- Operating system deployment collections
Strategic Analysis
High-Value Collections
High-Value Collections
Administrative Collections:Infrastructure Collections:
Attack Planning
Attack Planning
Target Identification:
- Members of administrative collections
- High-value systems and users
- Critical infrastructure components
- Device relationships and groupings
- Administrative access patterns
- Cross-collection membership analysis
Common Queries
Use Cases
Target Discovery
Target Discovery
High-Value Targets:
- Admin workstations and servers
- Domain controllers and infrastructure
- Systems with privileged user access
- Understanding deployment scopes
- Identifying deployment targets
- Analyzing organizational structure
Lateral Movement Planning
Lateral Movement Planning
System Relationships:
- Collections reveal system groupings
- Administrative boundaries and access
- Potential lateral movement paths
- Administrative collection membership
- High-privilege system identification
- Service account usage patterns
Output Analysis
Membership Patterns
Membership Patterns
Collection Size:
- Large collections (100+): Broad deployment targets
- Medium collections (10-100): Departmental or functional groups
- Small collections (1-10): Specialized or test groups
- Mixed collections: Both devices and users
- Device-only collections: System management
- User-only collections: Policy assignment
Related Commands
get collections- List and analyze collectionsget devices- Enumerate managed devicesget users- Enumerate user accountsget deployments- Analyze deployments to collections